It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.

Fine gizmo, you wanna know what I wanna know? Give me the full detailed specifications for the MP3 file format.

Or, you can write an article on how ListView window can be created and manipulated. I'm particularly interested in learning how the damn thing is painted.

Or how about the NetBIOS protocol. That would be nice, I've been meaning to make a nbtstat-like utility that produces more information that you can actually understand.

An article about named and anonymous pipes would be nice too. How to create one, how to write/read them. Example code in C - the works.

Ok fine, you probably don't wanna make an article on all the above. So here's one you probably would like to write. Write an article about that new wireless radio frequency they're starting to use which doesn't have limitations like not going through walls like bluetooth and such.

I want to find out how to identify wingates. Totally open proxies, not just for specific ports. Things like SR's port forwarder. I found the wingate at http://www.wingate.com and installed it on one of my boxes, figured out how to identify it, and made a scanner. But they don't seem to be that common, I've only found one. So how about getting other banners? Other methods of identifying one? I don't think it would be *too* tough, not like some of the other stuff mentioned. And I'll write a scanner that actually finds stuff and you can put it in the tools section

I don't mean accepting connections on any port, I mean rerouting connections for any port. As far as I know, http proxies only work for http requests. So you can use an http proxy to browse the web, but you can't use it to bounce telnet connections. So that's what I mean by working for all ports, allowing connections for different services like http, ftp, and telnet. Am I wrong though, do proxies work like this?

This is good technique to learn and can also be used to perform a manualportscan. E.g. Telnetting to every port on a victims computer and noting down which onesyou could connect to you and what services are running. This is what hackers hadto resort to before automated portscanners were written.

Banner grabbing is the art of connecting to a certain port or service and notingdown what response you get from the port daemon (The little "prog" that listensfor connections and then sends out information accorinding to what the usertypes/does). Here is an example.

The targets IP is 123.123.123.123. You need to find out what OS he is running.Lets try some common ports that give us feedback. We'll try port 80, http. To dothis we telnet to...and so on.

This is good technique to learn and can also be used to perform a manualportscan. E.g. Telnetting to every port on a victims computer and noting down which onesyou could connect to you and what services are running. This is what hackers hadto resort to before automated portscanners were written.

Banner grabbing is the art of connecting to a certain port or service and notingdown what response you get from the port daemon (The little "prog" that listensfor connections and then sends out information accorinding to what the usertypes/does). Here is an example.

The targets IP is 123.123.123.123. You need to find out what OS he is running.Lets try some common ports that give us feedback. We'll try port 80, http. To dothis we telnet to...and so on.

If you want more details, just let me know.

hahaha, you just lost half of your respect points, and that already wasn't too many... Who cares about grabbing? Everyone and their mother (my mother for one has 3 port scanners on her box) uses a port scanner.

ya giz, I'm with mr pimp on this one. Banner grabbing is not without it's usefulness. Portscanners sometimes have banner grabbing built in, and if you don't have any idea what the banners may tell ya, then it's worthless to ya. Don't dis working techniques just because you personally rarely have need for them.

AND, I have more respect for people who target an IP/computer and methodically examine all the ports and their banners than for opportunists who scan a whole IP range for an open port.